CVE-2026-4092
Impact
Allows an attacker to perform a "Path Traversal" attack to modify files outside the projects directory, potentially allowing for running attacker code on the developer's machine.
Patches
Fixed in version 3.2.0
Workarounds
- Only clone or pull scripts from trusted sources
- Review the output of the
pullandclonecommands to verify only expected project files are modified
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/google/clasp/security/advisories/GHSA-hqjg-pww4-pcgq, https://nvd.nist.gov/vuln/detail/CVE-2026-4092, https://github.com/google/clasp/pull/1109, https://github.com/google/clasp/commit/ba6bd666fe74de54950122b5d92ecf1dcc02a9d3, https://github.com/google/clasp, https://github.com/google/clasp/releases/tag/v3.2.0
